Trusted access to third party applications systems and methods
First Claim
1. A method of downloading trusted content, comprising:
- building a request for a trusted content while executing in a secure partition of a first mobile device trusted security zone of a mobile device;
responsive to executing in the secure partition of the first mobile device trusted security zone, stopping execution of a normal partition of the mobile device;
sending, by the mobile device, the request for the trusted content to a server, wherein the server comprises a server trusted security zone that at least partly handles the request for the trusted content;
receiving, by the first mobile device trusted security zone, the trusted content, wherein the trusted content comprises a trust token that contains information about the server trusted security zone and about the transmission of the trusted content;
storing the trusted content in a second mobile device trusted security zone of the mobile device;
inspecting the trusted content in the second mobile device trusted security zone, wherein inspecting the trusted content in the second mobile device trusted security zone comprises analyzing the trust token and comparing the trust token to a predefined trust criterion; and
responsive to the trusted content passing inspection, at least one of executing at least a portion of the trusted content by the first mobile device trusted security zone or presenting at least a portion of the trusted content by the first mobile device trusted security zone on a display of the mobile device.
6 Assignments
0 Petitions
Accused Products
Abstract
A method of downloading trusted content. The method comprises sending by a mobile device a request for a trusted content to a server, wherein the mobile device comprises a first mobile device trusted security zone and builds the request while executing in the first mobile device trusted security zone and wherein the server comprises a server trusted security zone and wherein the server handles the request for the trusted content at least partly in the server trusted security zone. The method comprises receiving the trusted content by the first mobile device trusted security zone, storing the trusted content in a second mobile device trusted security zone of the mobile device, inspecting the trusted content in the second mobile device trusted security zone, and when the trusted content passes inspection, at least one of executing or presenting a portion of the trusted content by the first mobile device trusted security zone.
-
Citations
18 Claims
-
1. A method of downloading trusted content, comprising:
-
building a request for a trusted content while executing in a secure partition of a first mobile device trusted security zone of a mobile device; responsive to executing in the secure partition of the first mobile device trusted security zone, stopping execution of a normal partition of the mobile device; sending, by the mobile device, the request for the trusted content to a server, wherein the server comprises a server trusted security zone that at least partly handles the request for the trusted content; receiving, by the first mobile device trusted security zone, the trusted content, wherein the trusted content comprises a trust token that contains information about the server trusted security zone and about the transmission of the trusted content; storing the trusted content in a second mobile device trusted security zone of the mobile device; inspecting the trusted content in the second mobile device trusted security zone, wherein inspecting the trusted content in the second mobile device trusted security zone comprises analyzing the trust token and comparing the trust token to a predefined trust criterion; and responsive to the trusted content passing inspection, at least one of executing at least a portion of the trusted content by the first mobile device trusted security zone or presenting at least a portion of the trusted content by the first mobile device trusted security zone on a display of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification